earmuff

joined 1 year ago
[–] earmuff@lemmy.dbzer0.com 6 points 1 week ago

This is simply not true. Nitrogen is not the issue, CO2 is. If you breathe too much CO2, your body panicks.

So do it properly and the worst you get is a slight headache. But since you are „high“, you don’t care anymore.

[–] earmuff@lemmy.dbzer0.com 26 points 1 week ago

People still think this is a suicide pod, while it is used by robots to generate electricity.

[–] earmuff@lemmy.dbzer0.com 19 points 3 weeks ago

Only because he had no windows

[–] earmuff@lemmy.dbzer0.com 1 points 3 weeks ago (1 children)

Yeah the Open Source version. I doubt that the hosted version is using that. Cloud providers have super fast DB’s that are basically compatible with the MySQL syntax

[–] earmuff@lemmy.dbzer0.com 1 points 3 weeks ago

My question was ironic, implying that anyone using it in a productive system/software/service is doing a very bad job at software architecture. I avoid any product relying on super slow software pieces.

[–] earmuff@lemmy.dbzer0.com 14 points 3 weeks ago (21 children)

Well, who is using mysql/mariadb nowadays anyways? If you haven’t made the switch to at least postgres in the past 5 years, you messed up anyways.

[–] earmuff@lemmy.dbzer0.com 2 points 3 weeks ago

I know. I was being ironic.

[–] earmuff@lemmy.dbzer0.com 12 points 3 weeks ago (6 children)

Who says CIG ever wanted to publish a game in the first place? It always has been a “Game Development as a Service”

[–] earmuff@lemmy.dbzer0.com 2 points 3 weeks ago (1 children)

Is this the only point, when it comes to security? In my experience, the ease of use is also a factor. Today, VPN clients are just one button and it runs. I2P is almost there, but requires you to setup some configs manually. So is it really worth to drive a tank to just go grocery shopping?

[–] earmuff@lemmy.dbzer0.com 3 points 3 weeks ago* (last edited 3 weeks ago)

Tomorrow passwords will be cracked in no time, because most algorithms are not quantum safe. Same with password length.

I never said it is not an attack vector. There are dozens if not hundreds. The question is about the probability, which is always a dimension if you manage risks. There is no need to list all theoretical possible attack vectors, if the probability of actually happening only affects 2 people on this planet.

Videos for educational purposes should not sensationalize unlikely attacks, as it only causes unnecessary fear. I’d rather have someone using torrent on VPN than not using anything at all because they are now afraid of the government.

 

This year I‘ll be able to upgrade to 25/25Gbps and I‘m planning on using at least 20Gbps for seeding 24/7. Is any maintainer of private trackers interested in inviting me?

 

I‘m trying to repair my Polar Vantage V2, as it has some electrical issues (display errors and unwanted button behavior). The watch is waterproof, which means the parts are most likely glued together. The watch doesn’t have to stay waterproof after repairs.

So far I only saw one screw on the side. Removing it did nothing. I also baked the watch at 80°C and 105°C for about 10 mins each in hopes it would soften the glue enough. I tried to use a suction cup to pull on the display, but nothing moved. I tried to put something between the case and display glass, but the gap is just too narrow.

I think increasing the oven temperature might end up in a damaged battery or display.

Any other recommendations on how I could open up the watch?

view more: next ›